You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
GitHub’s enterprise features bolster your security posture and compliance.
56
56
57
57
- Security Features
@@ -60,7 +60,7 @@ GitHub’s enterprise features bolster your security posture and compliance.
60
60
- Compliance Support
61
61
-**Compliance reports:** SOC 1 Type 2, SOC 2 Type 2, ISO/IEC 27001:2013 certifications available for audits and regulatory needs
62
62
63
-
## Scrubbing Sensitive Data from GitHub Repositories
63
+
## Scrubbing sensitive data from GitHub repositories
64
64
When secrets leak, you must rewrite history or engage GitHub support.
65
65
66
66
### Rewrite history
@@ -104,7 +104,7 @@ When vulnerabilities arise, use GitHub security advisories to:
104
104
105
105
A good advisory lists the affected versions, severity, patch status, and CVE references. Use GitHub’s built-in workflow to manage and publish advisories efficiently.
106
106
107
-
## Enabling Secure Software Development and Ensuring Compliance
107
+
## Enabling secure software development and ensuring compliance
108
108
109
109
Each policy is designed to balance security and usability, offering options that range from minimal restrictions to highly controlled environments.
110
110
The table below provides an overview of various security policies categorized by their level of control.
@@ -115,7 +115,7 @@ The table below provides an overview of various security policies categorized by
Copy file name to clipboardExpand all lines: learn-pr/github/manage-sensitive-data-security-policies/includes/3-scrub-sensitive-data-from-repository.md
+13-15Lines changed: 13 additions & 15 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,10 +1,8 @@
1
-
<!--Manage sensitive data and security policies in GitHub-->
2
-
3
1
In this unit, you’ll learn how to create and manage rulesets, and understand the advantages they offer over traditional protection rules.
4
2
5
3
As a GitHub administrator, you need granular control over who can push, delete, or rename branches and tags. **Repository rulesets** let you bundle multiple rules under a single name, apply them to selected branches or tags, and toggle them on or off without deleting them. They complement existing branch- and tag-protection rules, giving you a unified, layered approach to repository security.
6
4
7
-
## What Are Repository Rulesets?
5
+
## What are repository Rulesets?
8
6
9
7
A **ruleset** is a named collection of rules that apply to one or more branches or tags in your repository.
10
8
@@ -14,7 +12,7 @@ A **ruleset** is a named collection of rules that apply to one or more branches
14
12
15
13
For example, a ruleset for your `feature/*` branches can require signed commits and block force pushes for everyone except admins. You can also import existing tag-protection rules into a ruleset to reuse your current settings.
16
14
17
-
## Comparing Rulesets, Branch Protection, and Protected Tags
15
+
## Comparing Rulesets, branch protection, and protected tags
@@ -28,7 +26,7 @@ For example, a ruleset for your `feature/*` branches can require signed commits
28
26
-**Statuses:** Enable, disable, or evaluate (test) rulesets without deletion.
29
27
-**Transparency:** Developers and auditors can view active rulesets with read access, without admin rights.
30
28
31
-
## Creating Your First Ruleset
29
+
## Creating your first Ruleset
32
30
33
31
1. On GitHub.com, navigate to **Settings > Code and automation > Rules > Rulesets**.
34
32
2. Click **New ruleset**, then select **Branch** or **Tag**.
@@ -42,14 +40,14 @@ For example, a ruleset for your `feature/*` branches can require signed commits
42
40
> [!TIP]
43
41
> For release branches (`release/*`), require two successful status checks and block force pushes to enforce stability.
44
42
45
-
## Managing and Editing Rulesets
43
+
## Managing and editing Rulesets
46
44
47
45
-**View active rulesets:** On the *Rulesets* page, see which sets target a given branch or tag.
48
46
-**Edit a ruleset:** Click its name, adjust rules or targets, then **Save changes**.
49
47
-**Toggle status:** Enable or disable a ruleset without deleting it.
50
48
-**Delete:** Remove obsolete rulesets when they’re no longer needed.
51
49
52
-
## Available Rules
50
+
## Available rules
53
51
54
52
Repository rulesets support many of the same protections as branch and tag protection:
55
53
@@ -64,7 +62,7 @@ Common examples:
64
62
> [!TIP]
65
63
> Enforce your CI/CD pipeline by requiring key workflows as status checks before merges.
66
64
67
-
## Layering Rulesets and Protections
65
+
## Layering Rulesets and protections
68
66
69
67
GitHub aggregates all applicable rules—branch protection, tag protection, and multiple rulesets—and applies the most restrictive setting.
70
68
@@ -74,47 +72,47 @@ GitHub aggregates all applicable rules—branch protection, tag protection, and
74
72
75
73
**Outcome:** Pull requests need three reviews, and commits must be both signed and linear.
76
74
77
-
## Impacts of Policy and Ruleset Choices in GitHub Enterprise
75
+
## Impacts of policy and Ruleset choices in GitHub Enterprise
78
76
79
77
Your policies and rulesets affect security, compliance, developer experience, and operational efficiency. Finding the right balance between control and flexibility is essential.
Copy file name to clipboardExpand all lines: learn-pr/github/manage-sensitive-data-security-policies/includes/4-report-log.md
+9-9Lines changed: 9 additions & 9 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -5,7 +5,7 @@ You can access the audit log through GitHub.com, GitHub Enterprise Server, or Gi
5
5
> [!TIP]
6
6
> Suppose a critical repository vanished overnight. You’ll use the audit logs to pinpoint the deletion event and restore continuity.
7
7
8
-
## What Are Log Records?
8
+
## What are Log Records?
9
9
10
10
Your organization’s audit log records actions taken by organization members. Available to organization owners, the log provides information about actions that affect the organization, including:
11
11
@@ -18,7 +18,7 @@ Your organization’s audit log records actions taken by organization members. A
18
18
> [!NOTE]
19
19
> Logs are retained for up to 90 days in GitHub Enterprise Cloud (120 days via GraphQL on Enterprise Server).
20
20
21
-
## Viewing and Exporting Audit Logs via the GitHub UI
21
+
## Viewing and exporting Audit Logs via the GitHub UI
22
22
23
23
1. On GitHub.com, navigate to your organization’s **Settings > Audit log**.
24
24
2. Use the **Filters** field to narrow results by qualifier (actor, repo, action, date).
@@ -66,7 +66,7 @@ query {
66
66
}
67
67
```
68
68
69
-
## Investigating Missing Assets
69
+
## Investigating missing assets
70
70
71
71
To recover or audit missing resources like repositories or teams:
72
72
@@ -93,36 +93,36 @@ query {
93
93
}
94
94
```
95
95
96
-
## Use Cases for Audit Logs
96
+
## Use cases for Audit Logs
97
97
98
98
-**Security incidents:** Trace unauthorized access or data exfiltration.
99
99
-**Compliance audits:** Demonstrate policy enforcement (SOC 2, ISO 27001).
100
100
-**Operational troubleshooting:** Diagnose CI/CD failures or permission errors.
101
101
-**Access monitoring:** Review API token usage and SSH/Git activity.
102
102
103
-
## Security & Compliance
103
+
## Security and compliance
104
104
105
105
-**Data Retention:** 90 days on Enterprise Cloud; 120 days on Enterprise Server.
106
106
-**Access Control:** Only owners and security managers can view logs.
107
107
-**IP Logging:** Records source IP to detect suspicious access.
0 commit comments